首页 | 本学科首页   官方微博 | 高级检索  
     

基于演化博弈的拟态防御策略优化
引用本文:王敏,付文昊,王宝通,石乐义.基于演化博弈的拟态防御策略优化[J].计算机应用研究,2024,41(2).
作者姓名:王敏  付文昊  王宝通  石乐义
作者单位:中国石油大学(华东) 青岛软件学院、计算机科学与技术学院,中国石油大学(华东) 青岛软件学院、计算机科学与技术学院,中国石油大学(华东) 青岛软件学院、计算机科学与技术学院,中国石油大学(华东) 青岛软件学院、计算机科学与技术学院
基金项目:国家自然科学基金资助项目(62111530052);山东省自然科学基金资助项目(ZR2019MF034)
摘    要:网络空间拟态防御是近些年出现的一种主动防御理论,以异构冗余和动态反馈机制不断调整执行环境来抵抗攻击。然而,面对黑客的多样化攻击手段,仅凭借拟态防御抵抗攻击是不安全的。为了增强系统的安全防御能力,本文在目前已有的防御系统基础上提出更为合理的防御选取方法。将有限理性的演化博弈引入到拟态防御中,构建了由攻击者、防御者和合法用户组成的三方演化博弈模型,并提出了最优防御策略求解方法。该博弈模型利用复制动态方程得到了演化稳定策略。仿真实验结果表明,系统通过执行推理的演化稳定策略可以降低损失,遏制攻击方的攻击行为,对拟态防御系统中防御策略选取和安全性增强具有一定的借鉴意义。

关 键 词:拟态防御    主动防御    演化博弈    演化稳定策略    防御决策
收稿时间:2023/5/31 0:00:00
修稿时间:2024/1/11 0:00:00

Defense strategy optimization of cyber mimic defense based on evolutionary game theory
Wang Min,Fu Wenhao,Wang Baotong and Shi Leyi.Defense strategy optimization of cyber mimic defense based on evolutionary game theory[J].Application Research of Computers,2024,41(2).
Authors:Wang Min  Fu Wenhao  Wang Baotong and Shi Leyi
Affiliation:Qingdao Institute of Software, College of Computer Science and Technology, China University of Petroleum (EastChina),,,
Abstract:As an active defense technology, cyber mimic defense uses heterogeneous redundancy and dynamic feedback mechanism to constantly adjust the execution environment of defense system to resist attacks. However, in the face of diverse attack methods of hackers, it is unsafe to resist attacks by only relying on cyber mimic defense. In order to enhance the security defense capability of the system, this paper proposed a more reasonable defense selection method based on the existing defense system. It applied evolutionary game theory of bounded rationality to cyber mimic defense, constructed a three-party evolutionary game model consisting of attackers, defenders and legitimate users, and proposed a solution method for the optimal defense strategy. This game model used the replication dynamic equation to obtain evolutionary stable strategy. The simulation results show that the system can reduce the loss and restrain the attack behavior by implementing the evolutionary stable strategy of reasoning, which has certain reference significance for the selection of defense strategy and security enhancement in cyber mimic defense system.
Keywords:cyber mimic defense  active defense  evolutionary game theory  evolutionary stable strategy  defense decision-making
点击此处可从《计算机应用研究》浏览原始摘要信息
点击此处可从《计算机应用研究》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号